Professional Documents
Culture Documents
4, August 2014
I. INTRODUCTION
Digital watermarking technology is basically known for the
practical importance in the intellectual property rights. The
forthcoming technology has become more advanced and fast
development by the use of digital watermarking. In the recent
years the digital watermarking has achieved result in the field
of correlation-based techniques, frequency domain
techniques, DCT based techniques, DFT based techniques
and DWT based techniques. Digital watermarking is a
technique of embedding some information into the given data,
which is extracted later or being detected for various purposes.
The data embedded is called as watermark and the given data
is original information. Song Qiang and Zhang Hongbin [1]
proposed a new color image watermarking scheme based on
image self-embedding techniques. Song Qiang and Zhang
Hongbin techniques based on the bilinear interpolation and
DWT). In the recent tool in the field watermarking is Singular
value decomposition. Chih-Chin Lai and Cheng-Chih Tsai [2]
are proposed a hybrid image watermarking scheme based on
discrete wavelet transform (DWT) and singular value
decomposition
(SVDTwo-Level
DCT
and
SVD
watermarking for copyright protection and authenticity is
proposed by Jian Yu Bai and Feng Liu [3]. Most of the
domain transformation watermarking schemes works with
DWT and DCT [4].
Digital watermarking scheme for color image based on
image watermarking scheme for color image based on image
Manuscript received January 5, 2014; revised March 8, 2014.
Anubhav Kumar is with the Raj Kumar Goel Institute of Technology for
Women, Ghaziabad, India (e-mail: rajput.anubhav@gmail.com).
Anuradha is with the Electronics and Communication Engineering
Department, Laxmi Devi Institute of Engineering and Technology, Alwar,
India (e-mail: anuradhamit@gmail.com).
DOI: 10.7763/IJCEE.2014.V6.843
303
International Journal of Computer and Electrical Engineering, Vol. 6, No. 4, August 2014
(1)
(2)
(3)
(4)
(5)
(6)
International Journal of Computer and Electrical Engineering, Vol. 6, No. 4, August 2014
(a)
(b)
(e)
(f)
(g)
(h)
(i)
(j)
(c)
(d)
Fig. 4. (a) Original girls image, (b) watermark image, (c) watermarked
image, (d) recovered image.
(a)
(b)
(k)
(l)
(m)
(n)
(c)
(d)
Fig. 5. (a) Original Lena image, (b) watermark image, (c) watermarked
image, (d) recovered image.
(a)
(o)
(p)
Fig. 6. (a) Pepper and salt noise(.01) watermarked, (b) recovered pepper and
salt noise (.01) watermark, (c) pepper and salt noise(.02) watermarked, (d)
recovered pepper and salt noise (.02) watermark, (e) Gaussian noise (.001)
watermarked, (f) recovered Gaussian noise (.001) watermark, (g) Gaussian
noise (.002) watermarked, (h) recovered Gaussian noise (.002) watermark, (i)
rotation 45watermarked, (j) recovered rotation 45watermark, (k) rotation
90 watermarked, (j) recovered rotation 90 watermark, (m) brightness
(0.03,1) watermarked, (n) recovered brightness (0.03,1) watermark, (o)
contrast (0.06,0.98) watermarked, (p) recovered contrast (0.06,0.98)
watermark.
(b)
NC
(c)
(d)
305
N
j 1
M
i 1
W ( i , j )W ( i , j )
M
j 1
W (i , j )
(7)
International Journal of Computer and Electrical Engineering, Vol. 6, No. 4, August 2014
and multimedia.
REFERENCES
P S N R 1 0 lo g (
(M N )
(8)
M SE
where
M SE
1
MN
i 1 i 1 (Y ( i , j ) X ( i , j ))
M
(9)
IV. CONCLUSION
This paper gives a Nobel watermarking algorithm for color
images based on discrete wavelet transform. The quality of
the watermarked picture has a fine and enhanced nature of
Peak signal to noise ratio. The proposed strategy is robust to
loud, geometric and physical attacks. The experiment results
are better as far as NC values of the extracted watermarks and
PSNR of the watermarked image. At last the proposed
algorithm is simple and has better in secure correspondence
306